Dashifen
Mar 22 2006, 05:48 PM
Way back when, a number of us (I know Synner was involved and, if I remember correctly, Kagetenshi) worked on a thread called the Idiot's Guide to the Matrix. It was an SR3 themed thread aimed at a step by step explanation of a decking run. I got involved as the "player" while Synner was acting as a GM for the run. We didn't worry about any real-world stuff, just Matrix actions.
I'm judging from the amount of confusion about the Matrix 2.0 stuff in SR4, that such a thread would be of benefit to the forum members at large. Thus, I humbly throw my hat into the ring as a "GM" for this thread if someone else wants to act as a player. I suggest using either the Hacker or the Technomancer sample characters because that way we all have a common starting point. If we want to involve Rigging we can either start a new thread, or use the Drone Rigger, though I would add a few programs to that character myself.
I think the Technomancer provides us perhaps the best opportunity for exploration since the majority of actions performed by Technomancers are the same as those for Hackers (disregarding, for the moment, the semantic difference between programs and complex forms) but the Technomancer provides us all of the Resonance skills, Threading, and Sprites to examine.
As I see it there are a number of different scenarios that we could look at:
- Hacking a security node and performing a data steal.
- Hacking a commlink and searching for data on it.
- Hacking a security node and performing overwatch.
- Hacking someone's wireless equipment.
If we wanted to, we could also include the following:
- Operating a rigged security system.
- Intercepting and spoofing commands to a drone.
If you all have any others that we might want to examine, post away. And, if anyone wants to act as the "player" for this thread, volunteer away. For those that haven't seem the original Idiot's Guide to the Matrix thread, it was somewhat similar in structure to the DSF online games in
Welcome to the Shadows in that included both descriptive text about the nature of the action taking place (in normal type face) and a description of the dice rolling and mechanical details (in
orange). That trend seemed to be successful and helped to make the thread more interesting to read.
Any takers?
Aku
Mar 22 2006, 05:56 PM
I'll be the player, however, i would like to submit the character i made for a game instead. it would allow us to examine some of the "what-if's" as well in gear selection and what not. I can host it and post it in the top of the thread for all to see as well, so we all know what's where, but if you're inisistant on the archetype, thats fine as well.
Butterblume
Mar 22 2006, 06:00 PM
First thing would probably posting the archetypes
with errata worked in, and you can take it from there. Or we could use Aku
.
Thumbs up for your project.
Magus
Mar 22 2006, 06:05 PM
Hey Dash, I have a Hacker you can use
Leigh O'Rourke
Human Female Hacker
B:3 A: 6 R: 4 S:2 C: 4 I: 5 L: 5 W: 3 Edge: 4
Init: 9 Matrix Init 9 Cold: 14 Hot: 15
IPs 2 /2/3
Codeslinger (Hacking) Aptitude Hacking Scorched Spirit Bane Addicted Mod/Hash
Cracking Group 4
Electronics Group 3
Firearmas 3
Etiquette 3
Dodge 3
First Aid 3
Pilot GC 2
Infiltration 2
Novatech navi Upgraded 5 Firewall 5 System
Fairlight Caliban Upgraded 5 response 5 signal
AR Gloves
Sim Module w/HS
Agent Hacking (Exploit/Spoof/Stealth/edit/browse Rating 4
Agent Track (Scan ECCM Decrypt Sniffer Rating 4
Agent Combat (Black Hammer Attack) Rating 3
Edit Rating 3
Track 3
Browse 3
Analyze 3
Encrypt 3
Scan 3
Medic 4
Armor 3
BioFeedBack Filter 3
Defuse 3
ECCM 3
Command 4
Attack 4
Decrypt 4
Exploit 4
Sniffer 4
Spoof 4
Sniffer 4
Kleaner
Mar 22 2006, 06:06 PM
What a hacker does, and how he does it in the matrix are pretty clear from the rules, and have been well discussed on this board.
Some questions to talk about that I'd find helpful:
What isn't clear at all, is what do devices/systems do to detect hackers?
After a hacker hacks on the fly, does the system/device stop it's extended test once the hacker is in?
When does the system/device get a chance to detect the hacker? What kind of test is it?
What can a person in AR do to stop a hacker invading his comm link?
What does a "system" look like in AR? VR?
How do files work? Is there a directory tree that the hacker needs to go to first, or can he just do a data search +browse/scan once the hacker is in the system?
Why would a system NOT put data bombs/encryption on everything?
What is the difference between controlling a object (complex action) and issuing a command to an object(simple action)? For example when is a device (like a security camera) considered to be a device that needs to be controlled, and when is it considered to be something that you can just issue a command to?
p.s. basically I'm looking for information that a GM would find useful.
Synner
Mar 22 2006, 06:07 PM
The old IGTTM thread is still available
here for reference. I still feel bad for not finishing that final run, but my workload has not let up. I'm hoping to develop something similar as a walkthrough for the official
SR4 website in the future (you all know better than to ask dates) and meanwhile I think Dashifen's idea is perfect to help people out!
Guye Noir
Mar 22 2006, 06:14 PM
I think I can answer a few of your questions kleaner.
In AR/VR, a system looks like whatever it's programmers want it too look like.
You wouldn't put encryption and databombs on everything for the same reason you don't put locks on ALL of the internal doors in your house: convenience. Imagine what would happen to the productivity of the average office if everyone needed to remember a different password to access each and every one one of their files. Now imagine that same office with databombs on all of those files, going off every time somebody got a password wrong 3 times.
I'd say the difference between commanding and controlling is in how much 'control' the user has. Issuing a command is like giving a command to a dog. You tell it to go do something, then wait while it goes and does it. Actually taking control of a device is literally taking direct control of that device and directly controlling all of it's actions yourself.
Azralon
Mar 22 2006, 08:02 PM
I strongly endorse the existence of this thread.
Dissonance
Mar 22 2006, 08:02 PM
This looks like it'll be an interesting challenge. I think what you might want to do is actually make a nice mid-level character, who is focused in hacking, sure, but can do other stuff as well. Sure, your old-school decker could be a meat-wastoid, and your otakus to an even greater extent, but in this'n, you might want to explore secondary skills they'd want.
Like stealth. I'm not saying you'd have to do an entire run with a team of all hackers to explain, but it wouldn't be a bad-wrong idea to include the types of actions that hackers might have to do _prior_ to the actual hacking part, such as stealth and fast-talking. No rolls on those and so forth, but just Helpful Handy Suggestions.
I'd also suggest using things straight out of the box with minimal edges and flaws for your first dude, as well as using a real-boy off-the-shelf commlink.
Technomancers would also be worth exploring in the not-too-distant future, IMO. But right now? More Power To The Mundane.
I loved deckers in SR3. I just hardly ever had a chance to play them, because where I played, almost nobody knew the rules. I'd love to see the geeks get their day in the sun.
EDIT: Once this one is actually done? Or possibly once it gets to a point where it can _become_ done for whatever section you're working on? I'd strongly suggest putting a copy up in, like, Community with all the fat trimmed off and with any editorial changes needed. Go Team Hacker!
EDIT x 2: Man, it's getting to the point where we ought to get a new Dumpshock site that's still being updated with this kind of stuff. Don't we have some out there that haven't been updated since 2E?
Dashifen
Mar 22 2006, 08:03 PM
@
Aku: post your character, we'll go with that for the moment. Which scenario do you want to tackle?
@
Magus: wait in the wings, I'll jump to you for a different scenario when we get there and we can use this character.
@
Synner: thanks for the linkification. I'm available when you want to finish the run, I'll just have to bone up on SR3 again
@
Others:
If you look at the original IGTTM thread, there were questions interspersed throughout the major activity of the run. So don't worry about questioning or commenting on the system as we go along. Perhaps we'll use more color-coding to help distinguish the "meat" of the thread from the other questions. I propose
yellow for the information about what Aku's character and my systems are doing and
orange for the mechanics (die rolls, rules explanations, etc) within the thread. Then the normal typeface can be used for general questions or comments and we should all have a relatively easy-to-read thread. Until, of course, we forget about the conventions
Edit:
Also, since this thread stands to have a number of different questions from many different people, please do your best to indicate who asked each question when quoting (as I did with the post below this one).
Dashifen
Mar 22 2006, 08:22 PM
QUOTE (Kleaner) |
What isn't clear at all, is what do devices/systems do to detect hackers? |
Firstly, the system gets a test to detect the intrusion when the character breaks in (see Breaking In, p. 221). After that, the text on p. 222 suggests the following: security hackers, patrolling IC, and glitches. Hackers and IC would have to be equipped with the Analyze program to watch for Stealthy icons. I particularly like using glitches to bring the attention of a hacker or IC onto the hacker while critical glitches trip an alert right away. Technically, as well, the host could be running the Analyze program itself, giving it not only the intrusion test(s), but the chance to notice the hacker's icon when they log in to the system, but this would be up to the GM's interpretation of the Analyze program's ability to perform rudimentary matrix perception tests without the interaction of a Pilot or Hacker.
QUOTE (Kleaner) |
After a hacker hacks on the fly, does the system/device stop it's extended test once the hacker is in? |
I run it as yes. The text in the book states "Each time you make a test to hack in, however, the target node also gets to make a free Analyze + Firewall (Stealth) Extended Test. If the node detects you--whether you hack in or not--an alert is triggered." I see the Extended Test as having an interval of the same length as the Extended Test to hack on the fly. Thus, for every interval of the hacker's extended test, the target node makes an Analyze + Firewall (Stealth) test, adding any hits to all previous hits like any other Extended Test. Thus, if the node beats the hacker's stealth before the Hacker beats the system's Firewall (plus any mods for security/admin access), an alert is triggered. However, since after breaking in the hacker will no longer be performing "a test to hack in" the system stops getting this free test and must rely on secondary detection methods like those above.
QUOTE (Kleaner) |
When does the system/device get a chance to detect the hacker? What kind of test is it? |
There is the intrusion test which depends on whether your hacking on the fly or probing the target. If hacking on the fly, it's an Analyze + Firewall (Stealth) extended test as explained above. If probing the target, it's a single Analyze + Firewall (Stealth) test when the intrusion is successful. After that the system/device may not get another test at all, unless the GM rules that the system's Analyze program can run rudimentary perception tests similar to a character's Analyze program as described in the last paragraph of p. 217.
QUOTE (Kleaner) |
What can a person in AR do to stop a hacker invading his comm link? |
Turn off the commlink, turn off the commlink's wireless capabilities, skinlink their commlink, engage the hacker in cybercombat, use agents (IC) to engage the hacker in cybercombat, shoot the hacker, have friends shoot the hacker, etc.
QUOTE (Kleaner) |
How do files work? Is there a directory tree that the hacker needs to go to first, or can he just do a data search +browse/scan once the hacker is in the system? |
That's up to the GM. I ran one system that had a seperate file storage device so that needed to be detected prior to the files being available to the hacker. Thus, there was a Perception test necessary to find the file storage device followed by a data search + browse extended test to find the file in question. However, there's no real need for that first perception test unless the GM is trying to pull a fast one.
I thought the other few questions you asked were nicely handled by Guye Noir.
Magus
Mar 22 2006, 08:26 PM
Spiffy Dashifen, always glad to help. Your last thread with Synner opened me up to Deckers in SR3.
Waltermandias
Mar 22 2006, 08:39 PM
Yay! I can't wait to see this get done. My new character is a decent hacker and it would be great to have a clear guide as to how it all works. I am precisely the kind of Idiot this guide should be aimed at!
hobgoblin
Mar 22 2006, 09:51 PM
looking forward to see this thread in motion
i have even learned something from it. i had missed that the hack-on-the-fly detection test was a extended one. makes it much more nasty to do it the fast and noisy way
as for how stuff looks in ar. think of it somewhat like the desktop of today, only that stuff is floating in the air in front of you.
to find a specific node in the matrix, you fire up a program that search diffrent directory services (google, msn, yahoo and so on), other databases like dns and whois records, and maybe other sources to (i realy depends on how the program your using is designed).
ones found the node would probably appear as a "arrow", that when activated allows you to send commands to said host as if you where using it directly (kinda like how remote desktop is a window with the desktop of a remote system in it).
given how desktop search is a hot topic today, i belive that all content of the nodes are indexed into infinity. and if diffrent nodes are linked into a network they may allso share indexes.
so to locate a file you formulate the search terms and see what pops up. if you realy wanted to you could probably get a index dump that shows the diffrent metadata as folders and then you can look under each to check if it contains interesting files.
so in that way you get a directory "tree" but the system itself will probably be using a database as a filesystem and have some hardcoded search terms as "folders" on your AR hud (music, video, pictures, simsense, latest modified files, programs and maybe others). you can probably allso create your own permanent searches...
going VR and things turn into something that should be very similar to the good old days...
Dissonance
Mar 22 2006, 09:57 PM
I kind of figured that AR mode works a lot like it does in, say, Ghost in the Shell, or at least the S.A.C that they're playing on television nowadays. You have your regular reality, but also the capability to open up real-time windows in your perception and so-forth, whereas, yeah, VR mode goes back to the SR3 days.
Which makes sense, really. When you're at home and aren't going anywhere, I'd rather use VR mode from the comfort of my coma-chair and so-forth.
And speaking of the ARO stuff, I'm thinking back to the introductory cola wars run: How the heck could you do what the hacker did in there, what with the map overlay? As a runner, I'd find that _incredibly_ useful, knowing where hostiles were in realtime.
Azralon
Mar 22 2006, 10:02 PM
QUOTE (Dissonance) |
And speaking of the ARO stuff, I'm thinking back to the introductory cola wars run: How the heck could you do what the hacker did in there, what with the map overlay? As a runner, I'd find that _incredibly_ useful, knowing where hostiles were in realtime. |
An Analyze (interpret sensor feeds) + Edit (create/update map) agent would do the trick.
hobgoblin
Mar 22 2006, 10:04 PM
hacked cameras, all team comlinkes subscribed, some creative ARO work?
hell if i know but i would give the hacker a complex action to update the map...
a lot of people have interpeted it as being something similar ot the battletac stuff, as it basicly does the same job. if some we may see it appear in arsenal or unwired.
you will notice that there is stuff in the SR4 fluff that there are no rules for (like say a ghoul character iirc)...
Dashifen
Mar 22 2006, 10:12 PM
QUOTE (Dissonance) |
And speaking of the ARO stuff, I'm thinking back to the introductory cola wars run: How the heck could you do what the hacker did in there, what with the map overlay? As a runner, I'd find that _incredibly_ useful, knowing where hostiles were in real time. |
Well, if I were going to do that the first thing would be an extended Data Search + Scan test to locate the RFID transmissions in the building. As a GM, I would assume that the RFID information that would be transmitted by the tags would indicate whether the tag is on an employee or, say, a wall hanging or fluorescent light bulb. The threshold on that test would be high and would depend on the size of the area being searched. If the player wanted to limit the information to, say, just people in motion, I'd lower the threshold because the Scan program could quickly remove certain data from the overall system. The interval would be based on the Search Table (p. 220) so since you're searching one network for data, it'd be 1 combat turn.
Now to present the overlay, you could have gotten the floorplan from some form of public archive prior to the run. Perhaps you had someone fast talk their way into the building to scope out the hallways and what not. I long for the days of the old orientation system cyberware. If that one comes back, then you could be making the floorplan on the fly based on what that cyberware is able to produce. Without a pre-run map available, I'd probably allow another Data Search + Browse test with a hard threshold within the network to try and find any maps that the system maintains -- perhaps for fire alarms or even for internal employee tracking. If the hacker can find such a map at this time, then it's a simple matter of putting the little dots from the RFID's in the first search on top of the overlay from the second and viola! you have an overlay showing the location of anyone not in the party.
Course this relies on the fact that the employees have embedded chips, that there isn't signal dampening technology in effect somewhere (producing empty sections of the map) etc. Thus, it's going to change from host to host. The availability of such an overlay would probably be best determined prior to the run during legwork, I'd say.
Aku
Mar 22 2006, 11:28 PM
CODE |
Character Name: Aku Profession: Hacker/jack of many trades
Build Points Max: 400 Build Points Used: 400
Nuyen: Build points spent on Nuyen(50) Nuyen: 250000
Race: Race:Dwarf Build points spent on Race (25) Race Notes: Dwarf: Natural Thermographic Vision and +2 dice for Body tests to resist pathogens and toxins
Contacts: Build Points spent on Contacts (17) Contact # 0 Loyalty: 4 Connection Rtg: 5 Contact # 1 Loyalty: 6 Connection Rtg: 2 Contact # 2 Loyalty: 0 Connection Rtg: 0 Contact # 3 Loyalty: 0 Connection Rtg: 0 Contact # 4 Loyalty: 0 Connection Rtg: 0
Attributes: Build points spent on Attributes (160) Attributes: (min/current/max) Agility 1 / 3 / 6 Body 2 / 3 / 7 Reaction 1 / 3 / 5 Strength 3 / 4 / 8 Charisma 1 / 2 / 6 Intuition 1 / 3 / 6 Logic 1 / 5 / 6 Willpower 2 / 5 / 7 Essence 1 / 6 / 6 Magic 0 / 0 / 6 Resonance 0 / 0 / 6 Edge 1 / 1 / 6
Derived Attributes: Initiative 6 Memory 10 Composure 7 Judge Intentions 5 Lift/Carry 7
Walking Rate (m/turn): 8 Running Rate (m/turn): 20 Swim Rate (m/turn): 4 Lift w/out test (kg/lbs): 40/88 Overhead Lift w/out test (kg/lbs): 20/44
Condition Monitors: Physical Track: 11 Stun Track: 10
Active SKILLS: Build points spent on Active Skills:(148) Hacking (Log) RANK 5 Group: Electronics (Log) RANK 4 Pistols (Agi) RANK 3 Specialization: Semi-Automatics Perception (Int) RANK 4 Cybercombat (Log) RANK 5 Specialization: by Specific Opponents(IC) Electronic Warfare (Log) RANK 4 Group: Athletics (Str) RANK 2
Knowledge SKILLS: Build points spent on Knowledge Skills:(0) academic Computer Hardware Interfaces RANK:4 professional Security Procedures RANK:2 interests Games Matrix Games RANK:3 interests Sports Football RANK:4 Specialization: Pittsburgh Steelers academic Matrix Theory Technomancers RANK:6
Native Language: (free) English Specialization: Cityspeak
|
Gear is too ugly to copy from the excel spreadsheat, so i'll add that as a clicky in a moment as soon as i get hosted. One minor rule the GM allowed was he let me code and build my own software and commlink. as this is an idiots guide, i dont think the costs of such things really matter, but i'm letting everyone know of that now. i think that's the difference though, and im not sure if it's a "difference" he was just liberal in the amount of time that was usable prior to game start time.
geargearNot that it matters, but the history for the character went something like this:
My past is mostly a mystery to me. All i know is what Jenny Heathrow (contact 1 6/4 the only true friend thats stuck with me through the rest of this story) and Ken Redbull Mcduff (fixer 4/5) Have told me.
Apparently, my mind works on a 15 year cycle. Every 15 years on my half-birthday, i've dropped into a coma, only to wake up 6 months later, on my birthday. No clue as to who i am.
I know how to do and use everything i did before, but none of the people. At First, im told, i had alot of people behind me, helping me. But as this became a recurring problem, they slowly dwindled away, until there were two. I am now 8 years into my cycle. Hopefully, this time, i'll know what th frag is going on, before i get to 15 and ahalf years.
Waltermandias
Mar 23 2006, 12:00 AM
John Barnes fan? That is a very cool book.
Cain
Mar 23 2006, 12:50 AM
QUOTE |
Why would a system NOT put data bombs/encryption on everything?
|
Because Data Bombs are programs, and too many programs will lower your Response/System. If a typical commlink is like a typical PC, only with unlimited memory, even the average user could have hundreds of files. You wouldn't even be able to get close to securing all of them before you crashed your OS.
Let's assume that Zurich-Orbital, the super-nasty holy grail of the Shadowrun matrix, has an even 10 in all stats. It handles millions of transactions per day, and has multiple accounts for each and every megacorp on the planet. Even with this supersystem, if it tried to Data Bomb only 100 of the trillions of accounts it has, it'd come crashing down. And that assumes that Z-O would have no IC running at all!
Aku
Mar 23 2006, 12:51 AM
QUOTE (Waltermandias) |
John Barnes fan? That is a very cool book. |
who was this directed at?
Jaid
Mar 23 2006, 01:09 AM
i have a couple of questions...
can you hack a technomancer?
if so, what happens when you do?
Kleaner
Mar 23 2006, 01:15 AM
head explodes! haha...
well, it seems that if you hack them you can crash them giving them dumpshock, but since they don't store any files in the head, you'd have to get any paydata from comlinks subscribed to their noggin.
Jaid
Mar 23 2006, 01:19 AM
ok. i'll put some more specific questions...
can you use command on the technomancer?
can you create an account on the technomancer?
can you edit their memory?
can you unsubscribe them from things (for example, drones)?
can you make them go into VR? can you make them go out of VR?
just curious for opinions =P don't think these are really explained in the rules at present =P
Divine Virus
Mar 23 2006, 01:28 AM
QUOTE (Jaid) |
ok. i'll put some more specific questions...
can you use command on the technomancer?
can you create an account on the technomancer?
can you edit their memory?
can you unsubscribe them from things (for example, drones)?
can you make them go into VR? can you make them go out of VR?
just curious for opinions =P don't think these are really explained in the rules at present =P |
Um, Technomancer's minds are not nodes. They are PERSONAS. There is a key difference there. Though they have have the stats of a commlink, they do not have any storage or a PAN. Ergo, their minds cannot be "hacked," and you cannot do any of the things listed bellow, which can only be done to nodes and networks.
Jaid
Mar 23 2006, 01:37 AM
ah, ok then... so since it's not a node, the firewall attribute is pretty much just used for cybercombat then, right?
that does make more sense... i knew it was just a persona, guess i just never thought of the difference between a persona and a node =P
so then, another question: is the technomancer's persona always found near their meatbod, or is the persona able to be on the other side of the world (naturally this assumes an adequate wireless connection to the other side of the world).
ie, if you have a technomancer's persona as the center of a PAN, and the techno's persona is elsewhere, can you hack into their PAN? i mean, i suppose you could spoof it, but otherwise, i mean...
neko128
Mar 23 2006, 02:10 AM
I'd just flat-out say "no, you can't hack a technomancer".
Divine Virus
Mar 23 2006, 02:30 AM
QUOTE (Jaid) |
ah, ok then... so since it's not a node, the firewall attribute is pretty much just used for cybercombat then, right?
that does make more sense... i knew it was just a persona, guess i just never thought of the difference between a persona and a node =P
so then, another question: is the technomancer's persona always found near their meatbod, or is the persona able to be on the other side of the world (naturally this assumes an adequate wireless connection to the other side of the world).
ie, if you have a technomancer's persona as the center of a PAN, and the techno's persona is elsewhere, can you hack into their PAN? i mean, i suppose you could spoof it, but otherwise, i mean... |
Yeah, firewall is just for combat purposes.
The persona can go anywhere a regular persona could; that is to say anywhere in the Matrix. doesn't matter iif its right next door or 3 continents away, so long as the node/device is linked to the matrix.
For a Technomancer to have a PAN, they would have to have a commlink pretty much, in which case the System, firewall, response and signal of the commlink would be used.
Think of it this way. A node is like a website. a PAN is like a personal webpage and email account, cell phone and PDA all rolled into one. Your commlink is like a computer with a server hosting the PAN. The persona is like a mouse, keyboard, moniter and webrower; they are the tools that let you interact with the webpage/nodes. The Matrix is like the internet.
Any clearer?
Jaid
Mar 23 2006, 02:34 AM
hmmm... you subscribe things to your persona, not to your commlink though, i'm pretty sure. so technomancers should be capable of being the center of their own PAN.
anyways, i would like to clarify, basically i was asking if there was always something at the body of the technomancer to be hacked... not necessarily that the persona couldn't leave, but rather that there would always be something at the body =P
however, since the only thing at the body would be the data storage i suppose, the way to hack a technomancer's data storage is using electronic warfare type actions. since you can't hack their persona, that is.
Divine Virus
Mar 23 2006, 03:16 AM
QUOTE (Jaid) |
hmmm... you subscribe things to your persona, not to your commlink though, i'm pretty sure. so technomancers should be capable of being the center of their own PAN.
anyways, i would like to clarify, basically i was asking if there was always something at the body of the technomancer to be hacked... not necessarily that the persona couldn't leave, but rather that there would always be something at the body =P
however, since the only thing at the body would be the data storage i suppose, the way to hack a technomancer's data storage is using electronic warfare type actions. since you can't hack their persona, that is. |
The analogy I gave above does not work with technomancers. They break the rules some.
No technomancers cannot be hacked. They have no data storage in their bodies. It specifically says this in the rulebook. any datastorage must be done on an external device.
Thyme Lost
Mar 23 2006, 04:08 AM
QUOTE (Divine Virus) |
For a Technomancer to have a PAN, they would have to have a commlink pretty much, in which case the System, firewall, response and signal of the commlink would be used. |
QUOTE (Page 233) |
Technomancers have their own version of the persona, known as the living persona—essentially it is an organic commlink with sim module in the technomancer’s head. This living persona has attributes just like a regular persona, each based on the otaku’s personal attributes and Resonance. |
All Technomacers have commlinks...
Their commlinks are just organic.
Thyme...
Kremlin KOA
Mar 23 2006, 04:13 AM
hmm
the answer to hacking technomancers is figuring our how to recreate psychotropic IC
hobgoblin
Mar 23 2006, 05:14 AM
QUOTE (Cain @ Mar 23 2006, 01:50 AM) |
QUOTE | Why would a system NOT put data bombs/encryption on everything?
|
Because Data Bombs are programs, and too many programs will lower your Response/System. If a typical commlink is like a typical PC, only with unlimited memory, even the average user could have hundreds of files. You wouldn't even be able to get close to securing all of them before you crashed your OS.
|
im not entirely sure i agree with that interpetation...
as for a technomancer being able to maintain a PAN, its up for grabs. basicly the book dones not say either way. neither when it comes to hacking that organic "comlink" that technos call a brain...
only definitive thing we know is that they cant store files...
we can however guess somewhat.
if we say that the general matrix traffic and the PAN works on the same protocols, then yes in theory a techno can maintain a PAN. hell they can "reboot" their "comlink" so...
what you can and cant do if you try to hack it is a diffrent thing alltogether...
i would allow a hack, but at the time of entry, the hacker would experience something similar to a bad acid trip or something
no software would work (including when trying to take on the firewall. the programs should spit back some strange errors like incompatible node and stuff like that), and the number of things a hacker could do would be limited to maybe checking the subscriptions and some other general "browsing"...
Kremlin KOA
Mar 23 2006, 01:44 PM
but what abotu black hammering the node?
Dashifen
Mar 23 2006, 02:48 PM
Okay, we have our first character, probably an expert in the field of hacking. Aku, can you please describe how your character uses his two commlinks? You have a Fairlight Caliban listed as well as the Aku's Backdoor Special. Does one subscribe the other? What are your normal program load outs, etc.
Meanwhile, since this guy has all of the programs in the book at the highest rating possible, I think we should probably put this guy up against more serious opposition. Do you want to run an overwatch example with this character or a data theft, Aku? I'll start working on a host over lunch and we'll try to get things up and running tonight or tomorrow.
Azralon
Mar 23 2006, 03:50 PM
QUOTE (Thyme Lost @ Mar 23 2006, 12:08 AM) |
All Technomacers have commlinks... Their commlinks are just organic. |
Yeah, I don't see any reason to think that technos are immune to hacking.
Aside from being very unbalancing, it'd also mean that every corporation everywhere would toss out their existing computers and just plug technomancers into cubicles.
Dashifen
Mar 23 2006, 04:15 PM
QUOTE (Azralon) |
... it'd also mean that every corporation everywhere would toss out their existing computers and just plug technomancers into cubicles. |
Quiet ... don't give the run away to my players
'Course, they don't visit the boards as far as I know .....
Waltermandias
Mar 23 2006, 04:44 PM
@Aku
That was at you, the character background sounded alot like the John Barnes novel Kaleidoscope Century, which is a very cool book.
http://en.wikipedia.org/wiki/Kaleidoscope_Century
Azathfeld
Mar 23 2006, 05:26 PM
QUOTE (Azralon) |
QUOTE (Thyme Lost @ Mar 23 2006, 12:08 AM) | All Technomacers have commlinks... Their commlinks are just organic. |
Yeah, I don't see any reason to think that technos are immune to hacking.
Aside from being very unbalancing, it'd also mean that every corporation everywhere would toss out their existing computers and just plug technomancers into cubicles.
|
Mmm, what exactly are you hacking? There's nothing to break into, because there's no node there. There's nothing to access, and nothing stored on the technomancer. You could hack any gear that the techno has, but that's not the same as hacking the persona.
That's not to say that technos are immuned to matrix actions; you can attack them in cybercombat, for example. However, if you were to try to break through their persona, you'd find that there's no "there" there. There's no account to access, no node, and no programs running.
The biggest reason that corps don't replace all their computers with techomancers is the same reason that they don't replace all their regular employees with mages or adepts. There just aren't that many folks available, and they're not suited to everything, anyway.
Azralon
Mar 23 2006, 05:59 PM
QUOTE (Azathfeld @ Mar 23 2006, 01:26 PM) |
Mmm, what exactly are you hacking? There's nothing to break into, because there's no node there. There's nothing to access, and nothing stored on the technomancer. You could hack any gear that the techno has, but that's not the same as hacking the persona.
That's not to say that technos are immuned to matrix actions; you can attack them in cybercombat, for example. However, if you were to try to break through their persona, you'd find that there's no "there" there. There's no account to access, no node, and no programs running. |
I hear you and I don't discount the possibility that I'm wrong. Here's what I'm working from:
QUOTE (p208) |
Everyone who uses the Matrix has an access code. Your access code is like a phone number: it’s how others know where to reach you online. It’s also a way in which you may be tracked—something of concern to all shadowrunners. |
Assumption from the text: Technomancers use the Matrix, and therefore they have access codes.
QUOTE (p208) |
In order to enter some nodes (devices or networks), however—especially private ones—you must actually log in to an account. |
Assumption: A device or a network is a node. Technos still have PANs (actually they are a PAN), despite not having any integrated data storage units. Any device can have data storage nowadays, so a techno could keep his files in his glasses or watch or electronic socks if he declares it.
Assumption: Since a techno is their own commlink (complete with a subscriber list), you have to have a valid login to communicate with them (even if it's an "anonymous" login, I imagine, like when you're in active mode). Something that uses logins can potentially be hacked.
Oh, and a node doesn't need to have programs running to still be a node.
Aku
Mar 23 2006, 06:06 PM
well, hmm it does sound quite interesting, but no, i hadnt read, or even heard of the book before now. It was made up in a 5 minute "oh crap!" moment when i realized i hadnt written a backstory, and was looking for the easiest "out" possible.
hobgoblin
Mar 23 2006, 07:21 PM
QUOTE (Kremlin KOA @ Mar 23 2006, 02:44 PM) |
but what abotu black hammering the node? |
aim for the copy of the technos persona thats allways present (just like everyone else allso have a copy of their persona in their home comlink. or atleast thats my interpetation).
a black hammer program (or blackout, or attack for that matter) cant target a node directly. they target icons: personas, agents and ice...
Kremlin KOA
Mar 23 2006, 08:18 PM
um black hammer can only do personas
Azathfeld
Mar 23 2006, 09:16 PM
QUOTE (Aku) |
QUOTE (Azathfeld @ Mar 23 2006, 01:26 PM) | Mmm, what exactly are you hacking? There's nothing to break into, because there's no node there. There's nothing to access, and nothing stored on the technomancer. You could hack any gear that the techno has, but that's not the same as hacking the persona.
That's not to say that technos are immuned to matrix actions; you can attack them in cybercombat, for example. However, if you were to try to break through their persona, you'd find that there's no "there" there. There's no account to access, no node, and no programs running. |
I hear you and I don't discount the possibility that I'm wrong.
|
Fair enough, and I'll operate from the converse assumption that I may be wrong.
QUOTE |
Here's what I'm working from:
QUOTE (p208) | Everyone who uses the Matrix has an access code. Your access code is like a phone number: it’s how others know where to reach you online. It’s also a way in which you may be tracked—something of concern to all shadowrunners. |
Assumption from the text: Technomancers use the Matrix, and therefore they have access codes.
|
I'd agree there, provided that they have a service provider. Technos don't really need a service provider to access the matrix, although that's not spelled out in the text, but they would need one for most matrix services (getting mail, receiving calls, etc.). However, an access code only allows someone to get information to you. It doesn't make you a node.
Technos do manipulate the matrix directly, though, and thus don't necessarily need an access code.
QUOTE |
QUOTE (p208) | In order to enter some nodes (devices or networks), however—especially private ones—you must actually log in to an account. |
Assumption: A device or a network is a node. Technos still have PANs (actually they are a PAN), despite not having any integrated data storage units. Any device can have data storage nowadays, so a techno could keep his files in his glasses or watch or electronic socks if he declares it.
|
Any device is a node, and a network is a collection of nodes. Technos don't necessarily have a PAN, though. Technomancers have a persona without having a device, which is sort of the point. If they have regular devices, they can still have a PAN, and those devices remain hackable.
Keep in mind that a persona is not a node. You hack nodes, not personas. You attack personas, not nodes.
QUOTE |
Assumption: Since a techno is their own commlink (complete with a subscriber list), you have to have a valid login to communicate with them (even if it's an "anonymous" login, I imagine, like when you're in active mode). Something that uses logins can potentially be hacked. |
You don't use logins to communicate with a node, you use a login to access it. You pass information between users with a "commcode", but that's not the same as having a login to the node you're sending the information to.
QUOTE |
Oh, and a node doesn't need to have programs running to still be a node. |
Actually, it does, because outside of the context of a technomancer Firewall and System are programs. I just got served with that one myself in another thread.
Azralon
Mar 23 2006, 10:00 PM
Many.... tangled.... quoteboxes.... ow.
QUOTE (Azathfeld) |
I'd agree there, provided that they have a service provider. Technos don't really need a service provider to access the matrix, although that's not spelled out in the text, but they would need one for most matrix services (getting mail, receiving calls, etc.). However, an access code only allows someone to get information to you. It doesn't make you a node. |
TMs have built-in organic commlinks. Commlinks, in order to access the Matrix, must have an access code. TMs must have access codes or they couldn't receive calls, files, and whatnot.
But yeah, the text doesn't really say where they're getting their access codes. It doesn't really say where even normal commlinks get their codes; are there ISPs anymore? Who governs what your access code is? Is it a matter of something hardwired into each comm, like a MAC address on a network card? Fuzzy, fuzzy, and therefore bad.
QUOTE (Azathfeld) |
Technos do manipulate the matrix directly, though, and thus don't necessarily need an access code. |
I'd say they manipulate it directly in the same manner that a commlink manipulates it directly. The Technomancer section in the book says basically "TMs have organic commlinks and sim modules built in to their brains."
Example: If a TM makes a commcall (without running Stealth), what does the caller ID say on the other end? Is it absolutely blank or does it show his commcode?
QUOTE (Azathfeld) |
Any device is a node, and a network is a collection of nodes. Technos don't necessarily have a PAN, though. Technomancers have a persona without having a device, which is sort of the point. If they have regular devices, they can still have a PAN, and those devices remain hackable. |
My understanding is that TMs are their own commlinks, and as such they are effectively an organic "device." So it's not that they have a persona without a device, it's that they have a device without having a commlink.
If you could find a page number saying outright that TMs aren't a node, though, then that'd definitely make me re-evaluate my assumptions.
QUOTE (Azathfeld) |
Keep in mind that a persona is not a node. You hack nodes, not personas. You attack personas, not nodes. |
Absolutely. Point agreed upon and not in contention.
QUOTE (Azathfeld) |
You don't use logins to communicate with a node, you use a login to access it. You pass information between users with a "commcode", but that's not the same as having a login to the node you're sending the information to. |
Hrm, another fuzzy thing. Accessing is obviously a form of communication, and I'm basing the "anonymous user" form of login off of real-world access methods.
QUOTE (Azathfeld) |
QUOTE | Oh, and a node doesn't need to have programs running to still be a node. |
Actually, it does, because outside of the context of a technomancer Firewall and System are programs. I just got served with that one myself in another thread. |
By that reasoning, if I have no programs running on my commlink, it stops being a node. So that can't be the case.
Edit: Although I suspect the term "program" is getting some mud in here, since it sort of has two meanings in the literal sense and the game-mechanic sense.
mdynna
Mar 23 2006, 11:06 PM
I think everyone is getting confused between Persona and Commlink/Node.
In my understanding a Node is a system, a place, if you will, that a Persona (or Personas) can exist in the Matrix. A Hacker can exist in their Commlink (in fact the rules state that when entering VR for the "first time" from AR they start in their Commlink, their "home node").
I'm not looking at the book right now, but from how I see it, this issue comes to down to one decision: is a TM's brain simply a "floating" persona with no originating or home node, or does it function exactly like a Commlink only that it isn't an electronic device?
Considering the rules imply if not explicitly state, that a TM can do everything a standard Hacker (via his Commlink) can do, I come to the conclusion that a TM's brain must function as a Node the same way that a Commlink does.
It is clear that there is no data in a TM's "brain" so that cannot be taken. Where the rules are unclear (surprise) is if Complex Forms currently "running" can then be crashed by an intruding Hacker, or if the TM's brain can be crashed like any other Node can be shut down.
Finally I would rule that TM's have Commcodes and Access ID's functionally identical to a standard Commlink. A TM's brain's Access ID can be altered with the same amount of time in "mental concentration" as it takes a standard Hacker to change his Commlink's Access ID. The idea of a TM having no Access ID or Commcode, and thereby untraceable, is massively unbalancing.
hobgoblin
Mar 23 2006, 11:25 PM
node = host (sr3) = website/server (real life). atleast thats my view of it...
a sidenote about going from AR to VR. i would say that if a person have active connections/subscriptions (is it just me or are the book using the term subscriptions in two very diffrent ways depending on what its talking about?) the persons persona will show up in both (or is allready present. it would make things a pain in the ass if the persona suddenly vanishes when one change to AR).
i think we realy need this thread to get underway, there is a whole lot of vague point in the matrix rules...
Azathfeld
Mar 23 2006, 11:40 PM
QUOTE (Azralon) |
QUOTE (Azathfeld) | I'd agree there, provided that they have a service provider. Technos don't really need a service provider to access the matrix, although that's not spelled out in the text, but they would need one for most matrix services (getting mail, receiving calls, etc.). However, an access code only allows someone to get information to you. It doesn't make you a node. |
TMs have built-in organic commlinks. Commlinks, in order to access the Matrix, must have an access code. TMs must have access codes or they couldn't receive calls, files, and whatnot.
But yeah, the text doesn't really say where they're getting their access codes. It doesn't really say where even normal commlinks get their codes; are there ISPs anymore? Who governs what your access code is? Is it a matter of something hardwired into each comm, like a MAC address on a network card? Fuzzy, fuzzy, and therefore bad.
|
TMs have "essentially" a built-in commlink, which is not at all the same thing. I'm pretty sure that the "essentially an organic commlink" metaphor was designed to make it easier to understand technos, without the designers understanding what rules implications players would draw from it.
I don't disagree that technos need an access code to receive calls, files, and other, similar things. Access codes, though, and the synonymous "commcodes" (I think they must have changed terms during playtest and missed the first instance) are just a sort of phone number, and are registered with your Matrix service provider, or MSP, if you will (p. 214). Technos should only need a commcode to receive messages and calls. They can log onto nodes, intercept traffic, compile sprites, and so forth without one. At least, that's my interpretation.
The "organic commlink" thing breaks down really quickly when you try to hold it up to scrutiny. Here are some things that actual commlinks can do which technomancer "commlinks" explicitly can't:
- Store data
- Run programs
- Receive hardware upgrades through Build/Repair skills
- Run an off-the-shelf OS
- Have their wireless link disabled with a Hardware + Logic test
I suspect that one of those items is also "have users log on", but I can't prove it by the text, except through inference. Note that "logging on" to a node is not the same as "subscribing" to it, although the latter is necessary for the former. Subscription allows you to communicate iinformation, and receive it, but "accessing" a node, or "logging on", lets you take actions on the node itself. Many things in the Matrix can have subscribers or be subscribed, without being nodes, such as user personas, agents, and sprites.
Really, I think that thinking of a technomancer much like an organic agent or sprite is a good way to go about it. Those can have subcribers, and pass data, and run programs/CFs, acting essentially as a persona, but you obviously couldn't "log on" to one.
QUOTE |
QUOTE (Azathfeld) | Technos do manipulate the matrix directly, though, and thus don't necessarily need an access code. |
I'd say they manipulate it directly in the same manner that a commlink manipulates it directly. The Technomancer section in the book says basically "TMs have organic commlinks and sim modules built in to their brains."
Example: If a TM makes a commcall (without running Stealth), what does the caller ID say on the other end? Is it absolutely blank or does it show his commcode?
|
I think that making a commcall is likely one of those things that a technomancer needs a commcode for, which it would then display on the other end. Of course, I suppose the TM could be using a Spoof CF to fake a new commcode each time, so who knows?
QUOTE |
QUOTE (Azathfeld) | Any device is a node, and a network is a collection of nodes. Technos don't necessarily have a PAN, though. Technomancers have a persona without having a device, which is sort of the point. If they have regular devices, they can still have a PAN, and those devices remain hackable. |
My understanding is that TMs are their own commlinks, and as such they are effectively an organic "device." So it's not that they have a persona without a device, it's that they have a device without having a commlink.
If you could find a page number saying outright that TMs aren't a node, though, then that'd definitely make me re-evaluate my assumptions.
|
And, conversely, if someone could point out where it says that they
are one, I'd toss mine out the window.
The most I could do is point out that the Matrix Jargon section, p. 215, defines "device" as an "individual
electronic device", which technomancers are not. However, I'm the first to admit that the terminology gets very fuzzy around TMs, so nitpicking may not be helpful.
QUOTE |
QUOTE (Azathfeld) | You don't use logins to communicate with a node, you use a login to access it. You pass information between users with a "commcode", but that's not the same as having a login to the node you're sending the information to. |
Hrm, another fuzzy thing. Accessing is obviously a form of communication, and I'm basing the "anonymous user" form of login off of real-world access methods.
|
You need to communicate with a node to log on to it, but not vice versa. IRL, there are many ways of communicating between two computers on the internet without one logging on to the other. HTTP, VOIP, and IM are ways of passing information back and forth without "logging on", although in Matrix terms they require subscription.
QUOTE |
QUOTE (Azathfeld) | QUOTE | Oh, and a node doesn't need to have programs running to still be a node. |
Actually, it does, because outside of the context of a technomancer Firewall and System are programs. I just got served with that one myself in another thread. |
By that reasoning, if I have no programs running on my commlink, it stops being a node. So that can't be the case. Edit: Although I suspect the term "program" is getting some mud in here, since it sort of has two meanings in the literal sense and the game-mechanic sense. |
Probably true. I was pointing out that, technically, since Firewall and System are programs, and a "node" has to be running both, without running those you're just a paperweight, not a node.
Kremlin KOA
Mar 23 2006, 11:46 PM
QUOTE (Azathfeld) |
The "organic commlink" thing breaks down really quickly when you try to hold it up to scrutiny. Here are some things that actual commlinks can do which technomancer "commlinks" explicitly can't:
- Store data
- Run programs
- Receive hardware upgrades through Build/Repair skills
- Run an off-the-shelf OS
- Have their wireless link disabled with a Hardware + Logic test
|
I dunnno, do I need logic+ surgery instead? or will agility + pistols suffice